Displaying 11 results from an estimated 11 matches for "oom_adjust_restor".
Did you mean:
oom_adjust_restore
2013 Sep 21
1
[PATCH] Fix oom_adj on Linux after sshd reload
Currently, on linux sshd attempts to remove itself from the influence of
oom-killer by modifying the oom_adj parameter for itself in proc to -17.
This is controlled via two functions; oom_adjust_setup() and
oom_adjust_restore().
Setup saves the old score (typically zero on initialization) and sets sshd
to -17 whilst oom_adjust_restore places the saved value from initialization
back into the running sshd process.
The principle here being that whilst we want the main sshd listener process
never to be oom-killed, we wan...
2013 Sep 21
2
[Bug 2156] New: Fix oom_adj on Linux after sshd reload
...ndrot.org/attachment.cgi?id=2342&action=edit
Make oom_adj reset before re-execing sshd
Currently, on linux sshd attempts to remove itself from the influence
of oom-killer by modifying the oom_adj parameter for itself in proc to
-17.
This is controlled via two functions; oom_adjust_setup() and
oom_adjust_restore().
Setup saves the old score (typically zero on initialization) and sets
sshd to -17 whilst oom_adjust_restore places the saved value from
initialization back into the running sshd process.
The principle here being that whilst we want the main sshd listener
process never to be oom-killed, we wan...
2011 May 30
1
Fwd: Re: Fwd: cgroup OOM killer loop causes system to lockup (possible fix included) - now pinpointed to openssh-server
...3372 ? Ss 21:50 0:00 \_
sshd: root at pts/1
root at courtney:~/openssh-5.5p1# ps faux | grep "4821"
root 4821 0.0 0.0 49168 1160 ? Ss 21:50 0:00
/usr/sbin/sshd
root at courtney:~/openssh-5.5p1# cat /var/log/auth.log | grep -e "Set" -e
"oom_adjust_restore"
May 30 21:50:15 courtney sshd[4821]: Set /proc/self/oom_adj from 0 to -17
May 30 21:50:26 courtney sshd[4848]: debug3: oom_adjust_restore
May 30 21:50:26 courtney sshd[4848]: Set /proc/self/oom_adj to 0
On 30/05/2011 21:30, Cal Leeming [Simplicity Media Ltd] wrote:
> Hi all,
>
>...
2022 Dec 20
36
[Bug 3512] New: net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call)
...Reporter: jussi.koponen at iki.fi
After updating to sys-libs/glibc-2.36-r5 sshd stopped accepting
connections:
debug3: fd 6 is not O_NONBLOCK
debug1: Forked child 5799.
debug3: send_rexec_state: entering fd = 9 config len 3506
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug3: oom_adjust_restore
debug1: Set /proc/self/oom_score_adj to 0
debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9
debug1: inetd sockets after dupping: 4, 4
debug1: Local version string SSH-2.0-OpenSSH_9.1
debug1: Remote protocol version 2.0, remote software version
OpenSSH_8.6
debug1: compat_banner: match: OpenSSH...
2023 Dec 02
33
[Bug 3639] New: server thread aborts during client login after receiving SSH2_MSG_KEXINIT
https://bugzilla.mindrot.org/show_bug.cgi?id=3639
Bug ID: 3639
Summary: server thread aborts during client login after
receiving SSH2_MSG_KEXINIT
Product: Portable OpenSSH
Version: 9.2p1
Hardware: ARM
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component:
2008 May 25
19
[Bug 1470] New: adjust Linux out-of-memory killer to stop sshd being killed
https://bugzilla.mindrot.org/show_bug.cgi?id=1470
Summary: adjust Linux out-of-memory killer to stop sshd being
killed
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=34176
7
OS/Version: Linux
2024 Jun 15
11
[Bug 3702] New: sshd fork crashed when compiled with seccomp
https://bugzilla.mindrot.org/show_bug.cgi?id=3702
Bug ID: 3702
Summary: sshd fork crashed when compiled with seccomp
Product: Portable OpenSSH
Version: 9.7p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2020 Jul 07
3
libssh2 is hanging during a file transfert
...hd[31175]: debug1: Forked child 19126.
Jul 7 11:52:15 TOTO sshd[31175]: debug3: send_rexec_state: entering fd = 9
config len 970
Jul 7 11:52:15 TOTO sshd[31175]: debug3: ssh_msg_send: type 0
Jul 7 11:52:15 TOTO sshd[31175]: debug3: send_rexec_state: done
Jul 7 11:52:15 TOTO sshd[19126]: debug3: oom_adjust_restore
Jul 7 11:52:15 TOTO sshd[19126]: debug1: Set /proc/self/oom_score_adj to 0
Jul 7 11:52:15 TOTO sshd[19126]: debug1: rexec start in 6 out 6 newsock 6
pipe 8 sock 9
Jul 7 11:52:15 TOTO sshd[19126]: debug1: inetd sockets after dupping: 5, 5
Jul 7 11:52:15 TOTO sshd[19126]: Connection from 10.91.1...
2014 Dec 23
2
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
On Tue, 23 Dec 2014, Dmt Ops wrote:
> testing goole-authenticator's standalone functionality, it
>
> > cd google-authenticator/libpam/
> > ./demo
> Verification code: 123456
> Login failed
> Invalid verification code
> >
>
> fails with an INVALID code, and
>
> > ./demo
> Verification code:
2016 Nov 21
42
[Bug 2641] New: Add systemd notify code to to track running server
https://bugzilla.mindrot.org/show_bug.cgi?id=2641
Bug ID: 2641
Summary: Add systemd notify code to to track running server
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee:
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi,
OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at